Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Big data

Below you will find reports with the tag of “Big data”

image from Report Summary: Network Management Megatrends 2016

Report Summary: Network Management Megatrends 2016

This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. (more available)
Added: October 22, 2018
image from Securing A Digital Retail Enterprise

Securing A Digital Retail Enterprise

This whitepaper explores the necessary steps for securing a retail enterprise in a digital world.
Added: October 22, 2018
image from Modern Database Architecures Demand Modern Data Security Measures

Modern Database Architecures Demand Modern Data Security Measures

The objective of this report is to provide an understanding into how companies are approaching the challenges of evolving database ecosystems though cloud and big data initiatives. (more available)
Added: October 21, 2018
image from Stop Advanced Automated Attacks That Go Undetected

Stop Advanced Automated Attacks That Go Undetected

If you are interested in looking about Bots that go undetected, this paper is for you.
Added: October 21, 2018
image from 2017 State of Security Operations

2017 State of Security Operations

In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe. (more available)
Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. (more available)
Added: October 20, 2018
image from VIGOR: Interactive Visual Exploration of Graph Query Results

VIGOR: Interactive Visual Exploration of Graph Query Results

This research takes a look at mining visual graphs and analyzes the value of that activity.
Added: October 20, 2018
image from 9 Realities Of Data Protection In The 21st Century

9 Realities Of Data Protection In The 21st Century

This paper discusses how a portable and persistent data protection model can enable your business.
Added: October 19, 2018
image from Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

Adjusting the Lens of Economic Crime:Preparation brings opportunity back into focus

This year’s report illustrates how economic crime has evolved over the last two years, morphing into different forms depending on industrial sector and region. (more available)
Added: October 19, 2018
image from Flipping the Economics of Attacks

Flipping the Economics of Attacks

How much does it cost technically proficient adversaries to conduct successful attacks, and how much do they earn? In this report, they look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. (more available)
Added: October 18, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017. (more available)
Added: October 18, 2018
image from Top Global Business Risks of 2016

Top Global Business Risks of 2016

The fifth annual Allianz Risk Barometer identifies the corporate perils for 2016 and beyond, based on the responses of more than 800 risk experts from 40+ countries around the globe. (more available)
Added: October 18, 2018
image from Buidling a Business Driven Financial SOC

Buidling a Business Driven Financial SOC

This whitepaper outlines the unique challenges that business-driven financial SOCs deal with, and provides tools and tips on how to manage and resolve these challenges. (more available)
Added: October 16, 2018
image from Farewell To Audit Season

Farewell To Audit Season

This report discusses the new reality that audits and compliance are no longer a seasonal issue. It lays out some good steps for daily audits for the sake of compliance. (more available)
Added: October 16, 2018
image from The Cyber Readiness of Canadian Organizations

The Cyber Readiness of Canadian Organizations

The purpose of this research is to study how Canadian organizations are responding to cyber security threats and the need to invest in enabling security technologies. (more available)
Added: October 16, 2018
image from The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

Forcepoint conducted a study of 1,252 cybersecurity professionals worldwide to better understand the state of cybersecurity and how organizations might view a forward-focused strategy, one that moves beyond the current state of chasing infrastructure remediation. (more available)
Added: October 16, 2018
image from 2015 Strategic Security Survey

2015 Strategic Security Survey

In this report, they: a) Discuss the assumptions shaping IT defense spending plans b) Delve into the real and intangible costs of a data breach c) Examine why malware is still the most common form of breach. (more available)
Added: October 15, 2018
image from 2017 Global IP Reputation Analysis Report

2017 Global IP Reputation Analysis Report

This report provides a monthly snapshot of analysis and trends of IP Reputation globally.
Added: October 15, 2018
image from Email Fraud Threat Report Year In Review

Email Fraud Threat Report Year In Review

The details in this report are compiled from Proofpoint’s specific research and experience from the events of 2017.
Added: October 15, 2018
image from An Introduction To Machine Learning For Mobile Security

An Introduction To Machine Learning For Mobile Security

A close inspection of one of the most exciting and promising fields of research in 2017, and how it might be applied to the fast-moving world of mobile security. (more available)
Added: October 14, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.
Added: October 14, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 00:08 UTC (build 051771c)